Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy

被引:6
作者
Rams, Tomasz [1 ]
Pacyna, Piotr [1 ]
机构
[1] AGH Univ Sci & Technol, Dept Telecommun, Krakow, Poland
来源
2013 CONFERENCE ON NETWORKED SYSTEMS (NETSYS) | 2013年
关键词
security; cryptographic protocols; multicast communication; key distribution; self-healing; backward secrecy; REVOCATION;
D O I
10.1109/NetSys.2013.19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Self-healing group key distribution schemes allow for the establishment of a secure multicast communication between a group manager and group members through an unreliable broadcast channel. They can be used in multicast networks with centralized management, such as machine-to-machine systems, embedded and sensor networks, cellular networks and wireless networks. Constructions based on the exponential arithmetic are currently the most efficient long-lived schemes, but they lack backward secrecy. In this paper we present a new mechanism, which allows to achieve backward secrecy in this class of schemes and we illustrate its use in a long-lived key distribution scheme. Then, we perform security and performance analyses of the scheme, in order to show that it is efficient, achieves forward and backward secrecy, and resists collusion between the newly joined users and the revoked ones.
引用
收藏
页码:59 / 65
页数:7
相关论文
共 24 条
  • [1] Design of self-healing key distribution schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    Listo, M
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2004, 32 (1-3) : 15 - 44
  • [2] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
  • [3] Anti-collusive self-healing key distribution scheme with revocation capability
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, 150001, China
    [J]. Inf. Technol. J., 2009, 4 (619-624): : 619 - 624
  • [4] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [5] Dutta R, 2007, LECT NOTES COMPUT SC, V4521, P385
  • [6] Dutta R, 2010, L N INST COMP SCI SO, V42, P13
  • [7] Trade-Off between Collusion Resistance and User Life Cycle in Self-Healing Key Distributions with t-Revocation
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Dowling, Tom
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 603 - +
  • [8] Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Collier, Martin
    [J]. AD HOC NETWORKS, 2010, 8 (06) : 597 - 613
  • [9] Feldman P., 1987, 28th Annual Symposium on Foundations of Computer Science (Cat. No.87CH2471-1), P427, DOI 10.1109/SFCS.1987.4
  • [10] Gu J, 2010, IEEE INT C COMPUTATI, P1, DOI 10.1109/ICCPHOT.2010.5585094